Hi [[ session.user.profile.firstName ]]

Navigating the Blended Environment

As organizations adopt hybrid cloud models, the question becomes, "How do I efficiently and cost-effectively manage and secure apps in a hybrid environment?" Join the webinar to explore new approaches to centrally deploy, protect and manage secure application services across data centers and private and public clouds.
Recorded May 31 2017 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kamal Anand, VP & General Manager, Cloud at A10 Networks
Presentation preview: Navigating the Blended Environment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Prepare for the 5 Ways IoT Will Crush Your DDoS Defenses Recorded: Mar 28 2018 61 mins
    Andrew Shoemaker at Nimbus, Rich Groves at A10 Networks, Don Shin at A10 Networks
    Distributed denial of service (DDoS) attackers have weaponized the Internet of Things (IoT). Nefarious actors exploit millions of vulnerable, persistent IoT devices to create sophisticated malware-based DDoS botnets and use them to launch devastating attacks. Legacy defenses can’t stand up to the scale, sophistication and breadth of these DDoS of Things assaults.

    Join experts from A10 Networks and NimbusDDOS to learn:

    * The 5 ways IoT-based attacks have forced changes in DDoS defense strategies
    * Proven ways to prepare for the attack from the DDoS of Things
    * Fresh new approaches to achieve IoT DDoS resilience

    You will also see a live demonstration of a DDoS attack against A10 DDoS defense.
  • Redefine Your Mobile Network Security Strategy: Prepare for 5G & IoT Recorded: Mar 28 2018 62 mins
    Jim Hodges at Heavy Reading; Lakshmi Kandadai at A10 Networks
    You’re invited to witness the sheer impact 5G and IoT has brought to telcos and service provider organizations today and to gain the best approaches for securing your network.

    Join Heavy Reading and A10 Networks experts as they provide valuable research into the expanding attack surface and share how you can protect your network for your customers.

    Don’t risk your CAPEX and OPEX. Learn how to manage the evolving threat landscape and hear the common use cases to know how to build a robust security strategy. You’ll walk away with the following insights in this webinar:

    * The top security vulnerabilities in the era of 5G and IoT
    * How to achieve Gi/SGI LAN efficiencies
    * Approaches to strengthen security postures in mobile networks
    * Use cases and solutions for differentiating service offerings
  • The Anatomy of DDoS - Understanding and Surviving the 3 Most Rampant Attacks Recorded: Feb 20 2018 86 mins
    Randy Smith at Monterey Technology Group; Don Shin at A10 Networks
    The advent of botnets comprising countless IoT devices has ushered in a new era for DDoS attacks. Companies of all sizes find themselves the victim of at least one of the three most prevalent DDoS attack types: volumetric, network, and application.

    Join us with industry veteran Randy Smith of Ultimate Windows Security and Don Shin of A10 dig deep into the anatomy of volumetric, network, application attack types, and share the steps you can take to protect against their devastating effects.
  • Rethinking DDoS: Stronger Defenses That Make Economic Sense Recorded: Nov 15 2017 54 mins
    A10 Networks & Ixia
    74% of security professionals are increasing their spend on DDoS defenses, but will it be enough to combat the growing width, sophistication and intensity of today’s attacks? Confidence continues to wane on how doing more with legacy DDoS defenses will meet the challenge. Join a panel of experts from A10 and Ixia for a timely webinar on rethinking your approach to DDoS.

    You’ll learn:
    * Why weaponized IoT attacks (ie, Mirai and Reaper) mandate updated approaches
    * New ways to make decisions, prepare, and take action
    * A new methodology for testing DDoS defenses
    * How to maximize ROI while scaling defenses

    This live session will feature a brief demo of A10’s Thunder TPS solution withstanding a realistic DDoS attack generated using Ixia’s BreakingPoint test system. Don’t miss the chance to rethink your DDoS defense strategy and investments and learn the latest best practices.
  • Eliminate the Blind Spot with A10 Thunder SSLi Recorded: Nov 2 2017 43 mins
    James Schweitzer, CISSP, Sr. Systems Engineer, A10 Networks
    Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, more than 40 percent of all cyberattacks evade security tools by hiding in encrypted traffic, a recent Ponemon Institute study found.

    Meanwhile, the use of encryption is growing rapidly – roughly 70 percent of all web traffic is encrypted, creating a gaping blind spot in your network that’s ripe for exploitation.

    Join us for an exclusive webinar that digs into how to eliminate encrypted threats. In this session, you will learn:

    * The importance of SSL decryption
    * The security challenges of encrypting data
    * Pitfalls of decrypting in a firewall point solution network
    * How to maintain high level performance and scalability

    Learn how to eliminate the blind spot in your network without compromising performance and scalability.
  • Plan your migration to the IPV6 Standard Recorded: Jun 14 2017 50 mins
    Gennady Dosovitsky, Principal Solution Architect; Lakshmi Kandadai, Sr. Product Marketing Manager, A10
    In February 2011, the Internet Assigned Numbers Authority (IANA) allocated the remaining IPv4 address spaces to the Regional Internet Registries. The local registries are running low on IPv4 addresses. And rapidly.

    As a service provider, have you mapped a path to migrate to the new IPv6 standard and translate outgoing IPv4 addresses? Watch the webinar to gain proven deployment strategies for a smooth transition to the IPv6 standard.
  • Navigating the Blended Environment Recorded: May 31 2017 54 mins
    Kamal Anand, VP & General Manager, Cloud at A10 Networks
    As organizations adopt hybrid cloud models, the question becomes, "How do I efficiently and cost-effectively manage and secure apps in a hybrid environment?" Join the webinar to explore new approaches to centrally deploy, protect and manage secure application services across data centers and private and public clouds.
  • 5 Tactics to Combat the DDoS of Things Recorded: Mar 30 2017 57 mins
    Chase Cunningham, Don Shin of A10networks
    The second half of 2016 represented an unprecedented uptick in the volume, size and scope of distributed denial of service (DDoS) attacks.

    This barrage took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch mammoth DDoS attacks. For the first time, DDoS attacks exceeded the 1 Tbps threshold.

    Be proactive in DDoS protection and mitigation. Register for A10’s exclusive webinar and learn how to actively defend against looming IoT-powered DDoS attacks. In this webinar, you will learn:

    * Why you’re already at cyber war
    * What you can learn from Mirai
    * How to improve your DDoS mitigation plan
    * How to dynamically respond to attacks
    * The importance of cost-effective scale
  • Managing Threats from Every Angle Recorded: Jan 31 2017 52 mins
    Peter Krass, Information Week
    PREDICTING 2017’S THREAT VECTORS & THE COUNTERATTACKS YOU NEED TO RESPOND
    You’ve lost the tactical advantage. Your environment is not safe. No vector is secure. No infrastructure is protected. Understanding the situation is critical in changing cybersecurity behavior and fighting threat actors who have developed new strategies.

    In an exclusive on-demand webinar, A10 Networks will explore the introduction of new threat actors, attack strategies and detail how organizations must respond.

    This webinar will:

    * Demonstrate the impact of IoT-based attacks on security operations
    * Highlight repeated insider threat concerns
    * Prepare you for the next mega breach
    * Examine emerging hardware threats
    * Discuss the impact of predictive analytics and machine-learning
    * Outline the most vulnerable attack vectors, including ICS, physical access, PoS and IoT devices
    * Explore how compliance standards like GDPR and PCI will impact your bottom line
  • When Colossal DDoS Attacks Loom Recorded: Nov 11 2016 46 mins
    Paul Nicholson, Director of Product Marketing
    The motives and actors may vary, but there is one absolute: multi-vector DDoS attacks are growing in frequency, size, duration and sophistication. Defeating these colossal DDoS attacks requires a precise strategy, not blind hope.

    Join A10 Networks for an exclusive webinar that will recast the recent DDoS attacks that have soared past 600 Gbps. Plus, gain inside knowledge on how to identify and mitigate the colossal 1 Tbps attacks that will target organizations through 2017 and beyond.

    * Go inside the recent DDoS events, including the massive Brian Krebs attack
    * Explore evidence that supports growth and sophistication of DDoS attack vectors
    * Learn from the success and failure of other organizations
    * Get proven DDoS mitigation strategies from cybersecurity experts
  • Timing the Perfect ADC Refresh Recorded: Oct 26 2016 33 mins
    A10 Networks
    Don’t feel forced into renewing an outdated application delivery controller (ADC) appliance or license because you’re pressured by time, inconvenience or empty promises.

    Watch the on-demand webinar to learn how a smart ADC refresh will improve performance, security, management and support — all while reducing your costs.

    * Understand ADC capabilities
    * Dissect true TCO figures
    * Learn importance of multi-tenancy features
    * Gain insight into ADC scalability and ease of use
    * See how an ADC should integrate with your cloud strategy
    * Discover the importance of the ADC’s operating system
Secure Application Services
A10 modernizes the delivery of applications with analytics-driven visibility, performance and security solutions, via hardware or software, on premise or in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Navigating the Blended Environment
  • Live at: May 31 2017 5:00 pm
  • Presented by: Kamal Anand, VP & General Manager, Cloud at A10 Networks
  • From:
Your email has been sent.
or close